HK1294 Exposure and Stealing Breaking the Waves Fighting Pirates!
.
July 28, afternoon. Jing Yayuan.
Even if the internal network is isolated from the Internet, it still cannot stop Shi Lei's invasion. It must be said that Shi Lei accepted the Xuanhuang Thieves Group before, which was definitely a very wise decision.
After easily obtaining the HDI technical information from Amimon Company, Shi Lei was not going to use the VR game helmet secretly, but logged into the official website of BBC TV station.
Shi Lei hacked the official website of BBC TV station by controlling the EB server, and then published an announcement on the homepage of the official website.
The title of the announcement is "hdi.for.free!", which means 'free hdi technology'.
In the announcement, Shi Lei used English to reprimand Amimon Company in Israel, accusing Amimon Company of being a technology monopoly company that has obtained a large amount of monopoly benefits through HDI technology.
Therefore, as an anonymous hacker, I have the responsibility to stop Amimon Company’s ugly behavior and publish Amimon Company’s HDI technical information to the world.
In addition to the official website of BBC TV, Shi Lei also published the same announcement information on major social networking sites and news portals around the world, announcing HDI technology to the world.
Because Shi Lei used an anonymous identity and Shi Lei's skills were very good, even experts at the same level did not know who leaked the core confidential information of Amimon Company.
After the hdi technology was leaked, Amimon responded quickly. They first asked the World Intellectual Property Organization for help, hoping that the technical information about hdi would completely disappear from the Internet.
However, their wishes will certainly not come true.
HDI technical information is widely circulated on the Internet, and it cannot be stopped by the World Intellectual Property Organization. Besides, a large number of netizens have downloaded HDI technical information. So what if it is blocked on the Internet?
Amimon Company launched an investigation into the leakage of hdi technology, but Amimon Company knew very well that the server where they stored technical data was not connected to the Internet at all. For this reason, Amimon Company's senior management was more interested in the possibility of internal crime.
After all, how can outsiders steal data from internal servers that are not connected to the Internet?
After launching an investigation, Amimon Company quickly discovered that the surveillance records had been purged. This clue seemed to further point to the internal perpetrators. If it were not for the internal perpetrators, it would be difficult for outsiders to clean up the records of the surveillance system.
The reason is that the monitoring system and the server that stores data are internal networks that are independent of each other and are also isolated from the Internet. How can outsiders control two internal networks that are not connected to the Internet?
Amimon Company mainly suspected the possibility of internal crime, which saved Shi Lei a lot of trouble.
However, making HDI technology public to the world is only Shi Lei's first step. Due to patent restrictions and legal reasons, even if HDI technology is leaked, it is impossible for entertainment companies to directly use HDI technology.
In order to use HDI technology openly, Shi Lei chose to start with two companies from the Southern Dynasty. The two companies from the Southern Dynasty were LG and Samsung.
LG and Samsung both own a technology. That is the wireless technology known as the most promising, 60ghz 'millimeter wave' technology. This technology, known as relesshd technology in later generations, has just released a ten-meter range
Internal linking specifications.
In the future, the camp for this technology will be very strong. In addition to the two companies from the Southern Dynasties, there are also four companies from the Wasang Kingdom, namely nec, Sony, Panasonic and Toshiba.
The companies in this camp are all behemoths. The technology they jointly promote is indeed a very promising solution in the field of wireless display technology.
Shi Lei plans to steal the relesshd technology and mix it with the hdi technology to form a brand new technical solution to avoid patent restrictions.
LG and Samsung, these two giant companies, did not disconnect the internal network from the external Internet like Amimon.
These two large group companies have R&D centers all over the world, and data between the R&D centers needs to be exchanged. Except for absolutely confidential technologies, which are stored in an environment isolated from the Internet, the rest of the data is placed on the internal network.
They are very confident in their network security!
Both LG and Samsung have the world's top hackers behind them. Even if the world's top hackers attack their internal networks, they are unlikely to succeed.
It's always easier to defend than to attack!
Unless, like Shi Lei, he has an unannounced vulnerability!
Shi Lei first chose LG Company as the invasion target. Compared with Samsung Company, Shi Lei subconsciously believed that LG Company was easier to deal with. In fact, this was indeed the case.
This is not because the world’s top hackers behind LG are weaker than Samsung’s backers; it’s because Samsung’s server computing resources exceed those of LG.
The competition between peak-level hackers and peak-level hackers is usually based on server computing resources. If the server computing resources are sufficient, even world-class hackers can defeat the world's top-level hackers.
Looking for teeth.
For example, if Shi Lei fights against Tao Xian, Tao Xian has the support of Yizuer, plus In Secret Network and the supercomputer Lightning, but Shi Lei only has a laptop, so how can Shi Lei defeat Tao Xian?
Even when Tao Xian was eating potato chips and watching the show, Yi Zuer tortured Shi Lei into a dog!
This is the principle of defeating ten societies with one force!
With the assistance of Yi Zuer, Shi Lei carefully invaded the internal network of LG Company. As a global multinational enterprise, LG Company's internal network is very advanced, even more advanced than the networks of some government departments.
In the LG company's internal network, even Shi Lei, the world's top hacker, felt threatened every step of the way. However, Shi Lei had the assistance of an advanced pseudo-artificial intelligence system, as well as more than 1,300flops of loosely distributed computing resources, and 300flops of
of intensive distributed computing resources.
Such powerful computing resources. Not to mention an LG company, even the FBI, Shi Lei was confident of attacking their internal network.
On the LG company's internal network, Shi Lei ordered Yizuer to query the information with low permissions, while Shi Lei personally checked the information that required high permissions.
Nanchaoguo, LG company headquarters, network security department.
"Jin Zaixian. Check the status of server No. 4. The data fluctuation is a bit abnormal!" A young man gave the order.
Jin Zaixian is a security expert in the network security department of LG Company, and his skills are among the best. "Minister Park, please wait a moment. I will check in detail immediately."
Server No. 4 is a high-level confidential server of LG Company. Although the information stored in it is not top secret, it is still some relatively important information.
Jin Zaixian carefully checked the status of the server. Shi Lei immediately discovered the status of the server. He paused the operation and cleared the temporarily generated data records.
About thirty seconds later, Kim Zai-hyun responded to Minister Park: "Minister Park, no problem was found on server No. 4, and the data flow is all normal!"
Although server No. 4 is connected to the Internet, due to data traffic restrictions, as long as there is a fluctuation in data replication, it will be discovered immediately. At the same time, the server's security defense mechanism can also instantly disconnect the transmitted data. With this set
Defense mechanism, even if it is connected to the Internet, it is relatively safe.
"Pay close attention to the security of the internal network!" Minister Park said seriously, "Amimon Company of Israel, the core hdi technology, has been leaked. I don't want our LG Company to become the next joke!"
The security experts from the network security department all laughed. Jin Zaixian also laughed and said: "Minister Park, is it their internal personnel who committed the crime? After all, the internal network is isolated from the Internet, how can outsiders invade?"
Minister Park also laughed a few times and did not continue to speak.
Shi Lei discovered that the server's command to perform data checking disappeared. He started decrypting data and scanning data again. All high-level confidential data files were encrypted.
Fortunately, most of the files did not have special encryption schemes. Ordinary encryption schemes could not prevent Yi Zuer from decrypting them. Shi Lei and Yi Zuer searched each piece one by one, trying to find the technical information of relesshd.
It is not that Shi Lei has not considered that LG Company stores the data on relesshd technology in a top-secret server that is not connected to the Internet.
However, a top-secret server does not mean absolute security. A top-secret server can indeed effectively isolate the interference from the Internet. Even if it is placed in a safe room, it can also block theft problems in the real world.
Everything has advantages and disadvantages.
There are also disadvantages to a top-secret server that is isolated from the Internet. This disadvantage is the transfer of file data. As a top-secret server that is isolated from the Internet environment, its essential purpose is to isolate the feeling of external viruses and hackers.
However, when transferring stored data, there is a possibility of external attacks. No matter what storage medium is used to store data, transferring data from a top-secret server will definitely come into contact with other storage media.
If there is a malicious computer virus in other storage media, it will be a huge tragedy for the top-secret server.
Therefore, generally unimportant information will not be placed in top-secret servers. According to Shi Lei's inference, LG will not put the relesshd technology in top-secret servers.
Not only because LG doesn’t pay much attention to relesshd technology, but also because there are many companies that master this technology, LG doesn’t need to care too much.
At around eight o'clock in the evening, Shi Lei finally found the relsshd technology, and with the cooperation of Yi Zuer, opened the encryption lock of the file. However, how to transfer the file out became a big problem!
Shi Lei has discovered LG's security mechanism on LG's internal server, which is a data flow restriction scheme. Once an abnormality occurs in the data flow, the server will immediately stop the corresponding process.
For example, LG Company's No. 4 server, under normal circumstances, the data flow only fluctuates between 5kb and 8kb per second, but at a certain moment, the data flow suddenly rises to 20kb, and there is no relevant authorization. Then the No. 4 server will immediately end the corresponding
Data flow process.
The size of the relesshd technology file exceeds 300MB. Shi Lei is quite sure that as long as he dares to remotely copy and download the relesshd technical information, the security personnel of Server 4 will definitely detect the abnormality immediately.
In order to successfully obtain the technical information of relesshd, Shi Lei must think of a safe and appropriate method.
‘Damn it. This traffic restriction defense mechanism is so annoying!’ Shi Lei cursed secretly. LG’s traffic restriction defense mechanism is very advanced. It directly writes the traffic restriction defense mechanism into the underlying defense of the system, which is a core component of the system.
If Shi Lei attempts to end this process, the entire server 4 system will reject it. Forced termination will shut down the main system of server 4.
There was such a big movement. Except for the security personnel of LG Company, all of them were playing in the office for a group unobstructed conference. I'm afraid there was no second situation that could have prevented them from discovering the movement on Server 4, right?
‘Damn it! Do I have to enter the treasure mountain and come back empty-handed?’ Shi Lei was a little helpless. Hackers are called gods in the Internet world, but gods also have restricted areas. The internal network of a very large international company is one of the restricted areas.
Especially in restricted areas, when there are also gods, it is very difficult to obtain the necessary information without the gods noticing.
‘Yes! I almost forgot about other methods!’ A smile suddenly appeared on Shi Lei’s face. He had been thinking about how to use hacker methods to obtain LG Company’s relesshd technical information, but Shi Lei forgot that ordinary methods could also achieve the same purpose.
Stones from other mountains can attack jade!
"Yizur, start the image recognition engine, prepare for high-speed recognition, and identify all the technical data of relesshd through the camera once!" Shi Lei's idea was to use the image recognition engine to complete the theft of data.
Shi Lei invaded LG Company's No. 4 server and obtained the required information. However, due to some technical problems, Shi Lei was unable to return the information.
Especially using the copied command can easily trigger the alarm of LG Company. Therefore, Shi Lei had to find another way to complete it.
The graphic recognition engine is a behavioral dynamic recognition engine, a word recognition engine, a human facial feature recognition engine, and a static image recognition engine, which are integrated image recognition technologies.
This technology has not yet been perfected, but there is no big problem in identifying the technical data of relesshd.
Since it is remotely connected to LG Company's Server 4, the relesshd technical information displayed on Server 1 requires remote transmission of images from LG Company's Server 4. In order to prevent traffic restrictions from being triggered, Shi Lei set up remote display
The image quality of the content and the display speed of switching data.
Under the premise of ensuring that the relesshd technical information can be accurately identified, it does not matter even if the image quality transmitted remotely is poor. Because the Unreal Graphics Processing Engine can automatically repair the image and is not afraid of poor image quality at all.
As time passed by, Shi Lei looked at the percentage progress bar on the screen with sweat on his forehead. He had not been so nervous for a long time.
At 10:40 pm, Shi Lei finally let out a long breath!
The relesshd technical information was finally ‘downloaded’ from the LG company’s internal server.
"Yizur, quickly clean up the traces of the invasion and eliminate all traces!" Shi Lei gave the order. He stood up, twisted his waist, and moved his body.
"SR, the traces are being cleaned up. In addition, the Breaking Waves will arrive at the scheduled destination in eleven minutes! Depending on the weather conditions at the target location, the shipborne laser weapon of the Breaking Waves will be suppressed by the weather and its power will be reduced by 2%.
Eleven." Yizuer reminded Shi Lei.
"Are we there yet?" Shi Lei frowned. As expected, the laser weapon was seriously suppressed by the weather, and its power dropped by one-fifth and more than one percent. This was already a relatively miserable situation.
"SR, we have completed the cleanup work of all traces of the invasion!" In less than thirty seconds, Yizuer has completed the cleanup work. In fact, Yizuer is doing this work at any time. When Shi Lei invaded, Yizuer
Zul will simultaneously complete the cleaning of system records.
Of course, this is the advantage of having the assistance of a pseudo-artificial intelligence system!
Without the assistance of the pseudo-artificial intelligence system, Shi Lei devoted himself wholeheartedly to the attack, how would he have time to complete the work of cleaning up the traces? This shows the benefits of having a pseudo-artificial intelligence system.
Eleven minutes later, the Breaker arrived at its scheduled location in the Bermuda Triangle.
"SR, the shipborne radar of the Breaking Waves has not found any ship targets in the surrounding waters. Since the height of the waves exceeds 30 centimeters, it greatly affects the work of the shipborne radar. Whether it is centered on the target location and in a clockwise direction.
Is Xindian searching for possible targets?" Yi Zuer asked Shi Lei.
The hull height of the Breaker is only 220mm, and the shipborne radar is also at this height, emitting electromagnetic waves outward. Although the electromagnetic waves of the radar are radiated outward in all directions, a large part of them will be blocked by the waves, causing detection errors.
"Yes! Search clockwise!" Shi Lei agreed with the plan proposed by Yizuer. This is not Yizuer's innovative ability, but a fixed solution. In Yizuer's independent inductive learning judgment module, it has long been
Similar plans are stored.
The speed of the Breaking Waves armed unmanned patrol boat reaches 700 kilometers per hour. Even if the height of the waves reaches 300mm, exceeding the height of the Breaking Waves hull, it still does not affect the speed of the Breaking Waves.
While Shi Lei was checking the recently stolen relesshd technical information, he was also paying attention to the situation of the armed unmanned patrol boats. It was close to 12 o'clock in the night, and it was past 12 noon on the Bermuda side. The difference between the two sides was thirteen hours.
In the Bermuda Triangle area, the weather was a bit hazy at this time. The Breaking Waves armed unmanned patrol boat, as its name suggests, was sailing quickly on the sea.
At this time, the straight-line distance between the Breaking Waves and the sea area where the n235 metal is located has exceeded 40 kilometers. The Breaking Waves sailed clockwise, following the shape of mosquito coils, and the actual sailing distance was almost two hundred kilometers.
"SR, we found three targets, about fifteen kilometers away from the Wavebreaker. Do you want to investigate?" Yizuer asked.
Sometimes Shi Lei feels that Yi Zuer is very idiotic. In this case, shouldn't he still go and investigate?
"Go!" Shi Lei's tone did not fluctuate much. He knew that Yizuer did not have human emotions. Even if he smashed the No. 1 server, Yizuer would not have any emotion at all.
The distance of fifteen kilometers only takes less than two minutes for the Breaker, which travels at seven hundred kilometers per hour!
However, the Wavebreaker was not prepared to engage in close combat. Yizuer controlled the Wavebreaker and stopped three kilometers away from the target, letting the target enter the Wavebreaker's optical observation system and feeding the image back to Shi Lei.
Shi Lei checked the feedback images. These three ships were ships of the British Empire, which was not beyond Shi Lei's expectation. Two of them were actually warships, while the other one looked like a scientific research ship.
Shi Lei, who discovered the warship, had to say that the British Empire was a bit overbearing. The warships were coming. What kind of rhythm is this?
But, Shi Lei doesn't care about your situation!
Shi Lei just wants to keep the secret of n235 metal. If he wants to keep the secret, he needs to destroy these three British Empire ships without anyone noticing.
"Yizur, has the other party discovered the Wavebreaker?" Shi Lei asked.
The small hull of the Breaker should not be easy to detect when the waves exceed 30 centimeters. Even if it is scanned by radar, it will not be thought to be a ship, but only a wave.
"SR, the armed unmanned patrol boat Breaking Waves has not been discovered yet!" Yizuer fed back what Shi Lei had guessed.
Shi Lei was thinking about how to destroy the three ships smoothly. Although using ruby laser cannons could destroy them, it was impossible to destroy them silently.
The sea area where n235 metal is located is far enough away from the land that even laser weapons are not easily discovered by people on land. The key issue now is that the ruby laser cannon cannot destroy three ships in an instant.
But once the ruby laser cannon launches an attack, the other party will be able to discover the Breaking Waves armed unmanned patrol boat and successfully deliver the message. Even if the Breaking Waves eventually destroys three ships of the British Empire, the message has been passed on and the message will be sent out smoothly.
What's the use?
For now, the best way is to block radio communications near the three ships.
It is a pity that the radio jamming equipment of the armed unmanned patrol boat of the Breaking Waves is too small to interfere with the three ships of the British Empire.
Shi Lei had no choice but to think of another way!
.
ps: No one should guess how to get Brother Shitou!